header-logo
Suggest Exploit
vendor:
Webboard
by:
Alexander Fuchs
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Webboard
Affected Version From: 8.x
Affected Version To: 8.x
Patch Exists: NO
Related CWE: N/A
CPE: a:akiva:webboard
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux
2011

Akiva Webboard 8.x SQL Injection + Plaintext Passwords

It is possible to login as administrator with admin'-- as username and password. You can now go in the admin profil to look at the password which is in plaintext in html.

Mitigation:

Ensure that user input is validated and filtered before being used in SQL queries.
Source

Exploit-DB raw data:

# Exploit Title: Akiva Webboard 8.x SQL Injection + Plaintext Passwords 
in Profiles.
# Google Dork: " /Powered by WebBoard 8"/
# Date: 30.12.2011
# Author: Alexander Fuchs
# Software Link: http://www.akiva.com/default.asp?l=1&id=8
# Version: 8.x
# Tested on: Windows, Linux.
# CVE :  Nope.

It is possible to login as administrator with admin'-- as username and 
password.
You can now go in the  admin profil to look at the password which is in  
plaintext in html.